Secure Electronic Identification Device
In accordance with one embodiment of the present invention a secure electronic identification device (SEID) is presented. The SEOD includes a display mode for displaying government furnished information, a display mode for displaying user furnished information, and a public display mode for displaying public information. The SEID also includes a banking module with logic and resources for initiating financial transactions between the SEID and a payment gateway. The SEID includes a removable card having a magnetic strip and an EMV chip encodable by the SEID.
The present application is related to, claims the earliest available effective filing date(s) from (e.g., claims earliest available priority dates for other than provisional patent applications; claims benefits under 35 USC §119(c) for provisional patent applications), and incorporates by reference in its entirety all subject matter of the following listed application(s) (the “Related Applications”) to the extent such subject matter is not inconsistent herewith; the present application also claims the earliest available effective filing date(s) from, and also incorporates by reference in its entirety all subject matter of any and all parent, grandparent, great-grandparent, etc. applications of the Related Application(s) to the extent such subject matter is not inconsistent herewith:
This application is a continuation-in-part of U.S. patent application Ser. No. 13/902,834 entitled “Secure identification Card (SEID) System”, naming Joseph M. Gangi as inventor, filed 26 May 2013.
BACKGROUND1. Field of Use
The presently disclosed subject matters relates to Identification cards, mobile applications, and mobile devices such as mobile phones, Personal Digital Assistants (PDAs), iPods, tablet computers, laptop computers, and similar mobile devices. More particularly, the subject matter relates to a secure identification device which can be used at any type of terminal equipped with a magnetic stripe reader or a short range wireless communication capability.
2. Description of Prior Art (Background)
Authentication of an individual's identity is a fundamental component of physical and logical access control processes. A wide range of mechanisms is employed to authenticate identity, utilizing various classes of identity credentials. For physical access, individual identity has traditionally been authenticated by use of paper or other non-automated, hand-carried credentials, such as driver's licenses and badges. Access authorization to computers and data has traditionally been authenticated through user-selected passwords. More recently, cryptographic mechanisms and biometric techniques have been used in physical and logical security applications, replacing or supplementing the traditional credentials.
The strength of the authentication that is achieved varies, depending upon the type of credential, the process used to issue the credential, and the authentication mechanism used to validate the credential. This specification establishes a standard for a Secure Electronic Identification Device (SEID) based on secure and reliable forms of identification credentials issued and maintained by a state or local government entity. The SIC-C is intended to authenticate an individual's identification.
Homeland Security Presidential Directive 12 [HSPD 12], signed by the President on Aug. 27, 2004, established the requirements for a common identification standard for identification credentials issued by Federal departments and agencies to Federal employees and contractors (including contractor employees) for gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems. HSPD 12 directs the Department of Commerce to develop a Federal Information Processing Standards (HIPS) publication to define such a common identification credential. In accordance with HSPD 12, the FIPS standard defines the technical requirements for the identity credential that
-
- Is issued based on sound criteria for verifying an individual employee's identity
- Is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation
- Can be rapidly authenticated electronically
- Is issued only b providers whose reliability has been established by an official accreditation process.
The FIPS standard defines authentication mechanisms offering varying degrees of security. Federal departments and agencies determine the level of security and authentication mechanisms appropriate for their applications. The ID cards issued by the Federal government are generally referred to as Common Access Cards or CAC cards.
However, CAC cards require a master database or locally stored active directory coupled with a Personal identification Number (PIN) in order to determine a user's ID. In addition, CAC cards do not provide a user accessible area to store other user data, such as driver license numbers or a public area to store data such medical alert data in the event of an emergency. CAC cards do not provide a GPS locator feature.
In addition, CAC cards require sophisticated printing techniques in order to provide visual authentication that the card has not been tampered with; e.g., CAC security features include, at a minimum:
-
- Optical varying structures
- Optical varying inks
- Laser etching and engraving
- Holograms
- Holographic images
- Watermarks.
It will be appreciated that incorporating printed security features such as watermarks, holographic images, etc., is expensive and time consuming. Moreover, once of these features has been compromised it is not a simple matter to recall and reprint security cards implementing the compromised security feature.
It is desirable, therefore, to provide a secure identification card having multiple access areas. It is also desirable to provide a secure identification card having GPS locator capability.
BRIEF SUMMARYThe foregoing and other problems are overcome, and other advantages are realized, in accordance with the presently preferred embodiments of these teachings.
The SEID invention is directed towards a durable enclosure with a visible touch screen capability (capacitive or resistive) and a GPS transmitter. The SEID has a credit card-size form factor, with one or more embedded integrated circuit chips (ICC) that provide memory capacity and computational capability. The holder uses the SEID for authentication and other purposes. The SEID has three primary data storage areas: a private memory storage area for storing user Personal identification Information (PII) data; a public memory area accessible for storing emergency data such as medical information in the event of an emergency; and a government memory area for providing secure storage area accessible only by a government agency. PII data may include any suitable information defined to be personal information, e.g., addresses, phone numbers, age, etc.
One of the primary features of the SEID will be fingerprint recognition initiation for authenticating owner's private data such as driver's license and/or identification card, social security card, and the ability to upload individual's personal medical records. The driver's license portion in itself will be a secure government upload to the government memory area initiated through an office of legal authority.
Therefore, fingerprint registration is accomplished when the government identification is uploaded to the device. This is a separate application and secure upload from any other personal data, therefore, keeping certain records, such as, for example, secure drivers license, protected through government encryption technology.
The SEID contains GPS 911 tracking for multiple purposes, for example, loss of unit. A web site or toll free number with password or biometric user verification can be used to access information regarding the location of the device. Finally, it could have an interactive alert feature for emergency purposes.
In accordance with one embodiment of the present invention a secure electronic identification device is provided. The device includes a housing having a display on an outer side of the housing for displaying selected public, government, or user supplied data in the form of images representing public, government, or user cards, such as, for example, driver's license, social security cards, permits, library cards, credit cards, bank cards, and store cards. The secure electronic identification device also provides an inner circuit, inside the housing, for providing communication and display functions. In addition, the secure electronic identification device includes at least one secure memory area accessible by government systems for storing the government furnished information. Also included are at least one user-secured memory area for storing the user furnished information and at least one public memory area for storing the public information. The secure electronic identification device also includes a hi-stable electrophoretic display or an LED display for displaying the government, user, or public information. The aforementioned inner circuit includes the logic and resources to minimize display power consumption. In addition, the aforementioned inner circuit also includes the logic and resources to verify the source or authenticity of the government, user, or public furnished information. Also included in the secure electronic identification device is an LED or I/O port for transmitting or receiving the government, user, or public furnished information. The I/o port may be a powered USB port for charging the secure electronic identification device.
In accordance with one embodiment of the present invention a secure electronic identification device is provided. The device includes a housing having a display on an outer side of the housing for displaying selected public, government, or user supplied data in the form of images representing public, government, or user cards, such as, for example, driver's license, social security cards, permits, library cards, credit cards, bank cards, and store cards. The secure electronic identification device also provides an inner circuit, inside the housing, for providing communication and display functions. In addition, the secure electronic: identification device includes at least one secure memory area accessible by government systems for storing the government furnished information. Also included are at least one user-secured memory area for storing the user furnished information and at least one public memory area for storing the public information. The inner circuit further comprises an EMV Smart Card for implementing a global standard for inter-operation of integrated circuit cards (IC cards or “chip cards”) and IC card capable point of sale (POS) terminals and automated teller machines (ATMs), for authenticating credit and debit card transactions; a subscriber identification module (SIM) for storing a mobile subscriber identity and related key for identification and authentication; a general packet radio service (GPRS), and a global positioning satellite (GPS) module for locating the securable electronic identification device. The inner circuit also includes a secure card for access by a government system for identity proofing and registration; a memory area for storing the government, public, or user information; and a controller for controlling access to, including encrypting or decrypting, the government, public, or user information. The device also includes logic and resources for comparing and evaluating PINs and/or biometric data stored within the securable electronic identification device with biometric data presented by a user. Biometric data may be any suitable biometric data, such as, for example, fingerprints, retinal scans, or voice recognition.
The invention is also directed towards a securable electronic identification device for displaying government furnished information (i.e., uploaded by a government agent) selected from the group consisting of government issued, for example, driver's license, social security card, identification card, and permit license. In addition, the device displays user information selected from the group consisting of, for example, credit card, health insurance card, bank card, library card, and store card.
The invention is also directed towards a secure electronic identification device (SEID) having communication logic and resources for communicating with a payment gateway and communication logic and resources for communicating with a second SEID. The SEID also includes a display, electrically connected to the logic and resources for displaying information developed by the communication and logic resources. The SLID also includes at least one secure memory area accessible by government systems for uploading and storing government data and a secure selectable government display mode for displaying the government data uploaded by the government systems. The government data is secured by a government furnished PIN, fingerprint data, or retina scan data. In addition the SEID includes a removable card, wherein the removable card includes a magnetic strip and an EMV chip. The SEID includes a magnetic encoder for encoding the magnetic strip and logic and resources for encoding the EMV chip.
In accordance with another embodiment of the present invention an electronic device having a banking module is provided. The banking module includes communication logic and resources for communicating with a payment gateway and communication logic and resources for communicating with a second SEID. The electronic device includes a display, electrically connected to the logic and resources for displaying information developed by the communication and logic resources. The electronic device also includes a removable card having a magnetic strip and an INV chip. The electronic device comprises a magnetic encoder for encoding the magnetic strip and the ENVY chip with information developed by the communication and logic resources.
The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
The following brief definition of terms shall apply throughout the application:
The term “outer” or “outside” refers to a direction away from a user, while the term “inner” or “inside” refers to a direction towards a user;
The phrase “logic and resources” means hardware and for software components adapted to comprise a structural feature;
The term “comprising” means including but not limited to, and should be interpreted in the manner it is typically used in the patent context;
The phrases “in one embodiment,” “according to one embodiment,” and the like generally mean that the particular feature, structure, or characteristic following the phrase may be included in at least one embodiment of the present invention, and may be included in more than one embodiment of the present invention (importantly, such phrases do not necessarily refer to the same embodiment);
If the specification describes something as “exemplary” or an “example,” it should be understood that refers to a non-exclusive example; and
If the specification states a component or feature “may,” “can,” “could,” “should,” “preferably,” “possibly,” “typically,” “optionally,” “for example,” or “might” (or other such language) be included or have a characteristic, that particular component or feature is not required to be included or to have the characteristic;
Additionally, the section headings used herein are provided for consistency with the suggestions under 37 C.F.R. 1.77 or to otherwise provide organizational cues. These headings shall not limit or characterize the invention(s) set out in any claims that may issue from this disclosure. Specifically and by way of example, although the headings might refer to a “Field,” the claims should not be limited by the language chosen under this heading to describe the so-called field. Further, a description of a technology in the “Background” is not to be construed as an admission that certain technology is prior art to any invention(s) in this disclosure. Neither is the “Summary” to be considered as a limiting characterization of the invention(s) set forth in issued claims. Furthermore, any reference in this disclosure to “invention” in the singular should not be used to argue that there is only a single point of novelty in this disclosure. Multiple inventions may be set forth according to the limitations of the multiple claims issuing from this disclosure, and such claims accordingly define the invention(s), and their equivalents, that are protected thereby. In all instances, the scope of the claims shall be considered on their own merits in light of this disclosure, but should not be constrained by the headings set forth herein.
Use of broader terms such as comprises, includes, and having should be understood to provide support for narrower terms such as consisting of, consisting essentially of, and comprised substantially of. Use of the term “optionally,” “may,” “might,” “possibly,” and the like with respect to any element of an embodiment means that the element is not required, or alternatively, the element is required, both alternatives being within the scope of the embodiment(s). Also, references to examples are merely provided for illustrative purposes, and are not intended to be exclusive.
An operational SEID system in accordance with the present invention is logically divided into the following three major subsystems:
-
- SEID Front-End Subsystem—SEID, biometric readers, personal identification number (PIN) input device and ejectable SLIM card. The SEID interacts with these components to gain physical or logical access to the desired resource such as SEID issuance and management subsystem.
- SEID Issuance and Management Subsystem—the components responsible for identity proofing and registration, key issuance and management, and the various repositories and services (e.g., public key infrastructure [PKI] directory, certificate status servers) required as part of the verification infrastructure.
- SEID for storing user information, public information, and secure government information in memory sections having different read/write permissions. The SEID card also contains a GPS locator, GPRS module, ejectable SLIM card, and view/touch screen. The SEID card will be discussed in more detail herein.
Referring to
Still referring to
Still referring to
Still referring to
The SEID 10 includes a rechargeable battery pack 14 for powering the onboard circuitry. The rechargeable battery pack 14 may be fixed or removable. The SEID 10 also includes an optional CMOS battery 11 such as a lithium coin cell for backup power to critical circuits; such as the GPS circuitry 17, and the onboard real-time-clock (RTC) or system clock (not shown).
Still referring to
Also shown in
The SEID 10 also includes a controller 18 for controlling the various functions of the SEID including page or mode changing, infrared communications, download/upload commands, power maintenance, and data bus control and on/off functions.
Still referring to
The controller 18 also controls access to the memory areas: user accessible area 101A, public accessible area 101B, and government accessible area 101C. The memory section 101 may be any suitable non-volatile memory such as flash memory. Controller 18 access to government accessible area 101C is modified by secure card module 19.
Referring also to
Also shown in
It will be further understood that the user may make any of the display modes private, e.g., only accessible by the user, or, public, e.g., accessible by emergency personnel.
It will be further understood that certain data may be accessible by authorized personnel, e.g., police personnel in the performance of their duties, irrespective of the user set permissions. For example, upon surrendering the SEID 10 to police personnel the police personnel may access the driver's license mode to visually view driver license information by entering or scanning government authorization codes. Alternatively, the police personnel, or any authorized personnel may electronically query, via the infrared circuitry 16 and the aforementioned authorization codes, the SEID 10 to obtain certain information, e.g., driver's license information, electronically.
As will be discussed herein it will be appreciated that certain data displayed in certain modes may only be stored on the SEID via an authorized encryption process It will be further understood that attempts to tamper with encrypted data will result in permanent disabling of the “secure lock logo” 22 displayed in all display modes displaying encrypted or government furnished data. Permanent disabling the “secure lock logo” will result in the displaying of the “tampered logo” 24, thereby alerting a user or other authorized personnel that the SEID has been compromised and is no longer valid.
Still referring to
Referring also to
Referring also to
Still referring to
Still Referring to
Referring also to
The Data validator and maintenance component 51 deals with the personalization of the logical aspects of the card at the time of issuance and maintenance thereafter. This includes not only image downloads, names, and other personal identifying information (PII) data on the SEID Card, but also loading the relevant card applications, biometrics, and other data. A PIN entered via PIN input device 54 and/or user biometric data via Bio Metric reader 56 is used by the data validator and maintenance component 51 to control the ability to unlock the SEID Card 10 by the cardholder and then display the embedded credentials for authentication purposes. Bio Metric reader 56 may be any suitable biometric scanner such as, for example, a fingerprint scanner or a retinal scanner. Also shown in
The key management 58 component is responsible for the generation of key pairs, the issuance and distribution of digital certificates containing the public key of the SEID holder, and management and dissemination of certificate status information.
The key management component 58 is used throughout the life cycle of the SEID 10—from generation and loading of authentication keys and PKI credentials, to usage of these keys for secure operations, to eventual renewal, reissuance, or termination of the SEID government data. The key management component 58 is also responsible for the provisioning of government accessible, or other suitable repositories and services (such as PKI directories and certificate status responders), that provide information to the requesting application about the status of the PKI credentials.
Still referring to
Referring also to
-
- SEID Request 62. This activity applies to the initiation of a request for the issuance of SEID government data to be uploaded to SEID 10 and the validation of this request.
- Identity Proofing and Registration 64. The goal of this activity is to verify the claimed identity of the applicant and that the entire set of identity source documents presented at the time of registration is valid.
- SEID Government Data Issuance 66. This activity deals with the personalization (physical and logical) of the SEID and the issuance (upload) of the SEID government data to the intended applicant's SEID.
- PKI Credential Issuance 61. This activity deals with generating logical credentials and loading them onto the SEID 10.
- SEID Usage 63. During this activity, the SEID 10 is used to perform SEID authentication for access to a logical resource such as a secure memory location within the SEID 10. Access authorization decisions are made after successful cardholder identification and authentication.
- SEID Maintenance 68. This activity deals with the maintenance or update of the SEID data stored thereon. Such data includes various SEID applications, e.g., PIN PKI credentials, biometrics and government (local or federal) access codes. In addition, government may initiate a renewal notification via GPRS module ((FIG. 1—107).
- SEID Termination 65. The termination process is used to permanently destroy or invalidate the SEID government data and the data and keys needed for SEID 10 authentication so as to prevent any future use of the SEID 10 authentication. Termination of the SEID government data may be through I/O ports discussed earlier or proximity reader/writer 501. In addition, government may remotely initiate termination of government data via GPRS module (FIG. 1—107).
Referring also to
Still referring to
Referring also to
Payment gateway 829 forwards the transaction request to the payment processor 835. The payment processor. The payment processor forwards the transaction request to the user's credit card bank or company 839. The user credit card bank or company 839 checks the transaction details for validity (e.g., card number, expiration date, funding limits, bio data, etc.)
The credit card company 839 responds with a status (e.g., approved (payment authorization code), declined, rejected, etc) to the payment processor 835 via path 837 which in turns forwards the status to payment gateway 829. Payment processor 835 forwards status via path 833 to payment gateway 829. Payment gateway returns the status via path 827 to display area 28. SEID 10 displays payment authorization code 817, approved amount 819, and barcode 821. It will be appreciated that barcode 821 may be any suitable code such as QR code. The user may provide the merchant with the authorization code 817 or the merchant may scan bar code 821 to complete the transaction. Also displayed is transfer to SLIM card option 823. The SLIM card option 823 will be discussed herein.
Referring also to
After selecting desired bio data and entering amount the user is presented with a PIN screen 813 for entering a personal PIN number. Next the user selects button 815 which scans users fingerprint and initiates a transaction request 825 to the payment gateway 829. Transaction request 825 includes SIM ID, PIN, Fingerprint Scan data, Bio data, Account Number, and Credit Card number. Certain portions of the transaction request may be encrypted.
Payment gateway 829 forwards the transaction request to the payment processor 835. The payment processor. The payment processor forwards the transaction request to the user's credit card company 839 or the user's bank 901 depending upon the bio data association with either a bank account or a credit card number. The user credit card company 839 or bank 901 checks the transaction details for validity (e.g. card number, expiration date, funding limits, bank accounts, bio data, etc.) The credit card company 839 or user's bank 901 returns status information via pathways 837, or 903, respectively, to the payment processor 835.
The payment processor 835 forwards the status to payment gateway 829. Payment processor 835 forwards status via path 833 to payment gateway 829. Payment gateway returns the status via path 827 to display area 28. SEID 10 displays payment authorization code 817, approved amount 819, and barcode 821. It will be appreciated that barcode 821 may be any suitable code such as QR code. The user may provide the merchant with the authorization code 817 or the merchant may scan bar code 821 to complete the transaction. Also displayed is transfer to SHIM card option 823. The SLIM card option 823 will be discussed herein.
Referring also to
Still referring to
Payment gateway 829 forwards the transaction request to the payment processor 835. The payment processor forwards the transaction request to the user's credit card company 839 or the user's bank 901 depending upon the user's selection 1001 (either a bank account or a credit card). The user credit card company 839 or bank 901 checks the transaction details for validity (e.g., card number, payment authorization code, expiration date, funding limits, bank accounts, bio data, etc.) The credit card company 839 or user's bank 901 returns status information via pathways 837, or 903, respectively, to the payment processor 835.
The payment processor 835 forwards the status to payment gateway 829. Payment processor 835 forwards status via path 833 to payment gateway 829. Payment gateway returns the status via path 827 to display area 28. SEID 10 displays payment authorization code 817, approved amount 1003, funds deposited to account 1003, and/or funds deposited to credit card 1005.
Referring also to
Although an exemplary embodiment of the present invention has been shown and described with reference to particular embodiments and applications thereof, it will be apparent to those having ordinary skill in the art that a number of changes, modifications, or alterations to the invention as described herein may be made, none of which depart from the spirit or scope of the present invention. For example, the SEID 10 will also have the ability to perform card holder processing or self-processing (id pay technology). Cardholder will have the ability to process a payment request from their SEID device to the card issuer (i.e. bank, credit card Company, or bank account). The cardholder will have biometric ID and password on file and predetermined priority payment assignment selected. This will be on file with selected processor thus allowing for speed pay through id pay technology. This unique biometric identification and password will be in the data trail approving each and every transaction assuring and guaranteeing that the transaction could only have been initiated or can only be initiated through the correct biometric identification of the card holder. Once the processor receives requested amount by card holder, a unique bar code with identifier for the predetermined amount with payee approval code will display for merchant scan or print. The SEID device in idle state, the home page, can display the various user name and simple user data.
It will be appreciated that the novel features described herein creates a new paradigm shift in the payment processing industry for extreme high security in payment processing and protection of data. This eliminates to ever having to give or present a physical credit card to any merchant or anyone for any reason since payments are processed through the processor of the individual card holder.
Claims
1. A secure electronic identification device (SEID) comprising:
- a housing comprising: communication logic and resources comprising: communication logic and resources for communicating with a payment gateway; communication logic and resources for communicating with a second SEID; and a display, electrically connected to the logic and resources for displaying information developed by the communication and logic resources.
2. The SEID as in claim 1 further comprising:
- at least one secure memory area accessible by government systems for uploading and storing government data;
- a selectable government display mode for displaying the government data uploaded by the government systems.
3. The SEID as in claim 2 wherein the government data comprises user bio data.
4. The SEID as in claim 3 wherein the user bio data comprises at least one user fingerprint data.
5. The SEID as in claim 3 wherein the user bio data comprises at least one retina scan data.
6. The SEID as in claim 2 wherein the selectable government display mode further comprises logic and resources for entering a government supplied personal identification number (PIN) to allow displaying the government data.
7. The SEID as in claim 1 further comprising:
- at least one private memory area accessible by a user for uploading and storing user private data;
- a selectable user private data display mode for displaying, the user private data; and
- logic, and resources for entering a user supplied personal identification number (PIN) to allow displaying the private data.
8. The SEID as in claim 3 further comprising at least one biometric scanner.
9. The SEID as in claim 8 wherein the at least one biometric scanner comprises:
- a fingerprint scanner for scanning a fingerprint; and
- logic and resources for comparing the scanned fingerprint with the government supplied user bio data.
10. The SEID as in claim 8 wherein the at least one biometric scanner comprises:
- a retinal scanner for scanning a retina; and
- logic, and resources for comparing the scanned fingerprint with the government supplied user bio data.
11. The SEID as in claim 1 further comprising a GPRS module
12. The SEID as in claim 1 further comprising:
- a removable card, wherein the removable card comprises: a magnetic strip; an EMV chip;
- a magnetic encoder for encoding the magnetic strip; and
- logic and resources for encoding the EMV chip.
13. The SEID as in claim 2 further comprising the logic and resources to verity the source of the government, user, or public furnished information and logic and resources for alerting if the information has been altered.
14. An electronic device comprising:
- a banking module, wherein the banking module comprises:
- communication logic and resources comprising: communication logic and resources for communicating with a payment gateway; communication logic and resources for communicating with a second SEID;
- a display, electrically connected to the logic and resources for displaying information developed by the communication and logic resources;
- a removable card, wherein the removable card comprises: a magnetic strip; an EMV chip; and
- a magnetic encoder for encoding the magnetic strip and the EMV chip with information developed by the communication and logic resources.
15. The electronic device as in claim 14 wherein the communication logic and. resources further comprises a GPRS.
16. The electronic device as in claim 14 further comprising:
- at least one secure memory area accessible by government systems for uploading and storing government data;
- a selectable government display mode for displaying the government data uploaded by the government systems; and
- logic and resources to verify the source of the government furnished information and logic and resources for alerting if the information has been altered.
17. The electronic device as in claim 16 wherein the government data comprises user bin data.
18. The electronic device as in claim 17 further comprising bio scanners for capturing user bio metrics and logic and resources for comparing the user bin metrics with the government stored user bio data.
19. The electronic device as in claim 14 further comprising an EMV chip fur implementing a global standard for inter-operation of integrated circuit cards (IC cards or “chip cards”) and IC card capable point of sale (POS) terminals and automated teller machines (ATMs), for authenticating credit and debit card transactions.
20. The electronic device as in 16 wherein the government data comprises data selected from the group consisting of government issued: driver's license, social security card, identification card, and permit license.
Type: Application
Filed: Jul 14, 2015
Publication Date: Jan 21, 2016
Inventor: Joseph M. Gangi (Bristol, RI)
Application Number: 14/799,356